Sponsored Content
Full Discussion: Eth0 Limitations
Operating Systems Linux Red Hat Eth0 Limitations Post 302640879 by methyl on Tuesday 15th of May 2012 11:36:06 AM
Old 05-15-2012
I think you need to post the difference between two samples over a given reasonable period of time.


Depending on what network kit this server is plugged into, auto-negotiation should be avoided. It usually needs turning off on the server and the LAN port. Similarly anywhere where network components are cascaded.
It looks like auto-negotiation is off on your server.

Last edited by methyl; 05-15-2012 at 12:44 PM..
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

mkdir limitations

What characters can't be used with a mkdir? Any limits on length of name? Thank you, Randy M. Zeitman http://www.StoneRoseDesign.com (12 Replies)
Discussion started by: flignar
12 Replies

2. UNIX for Dummies Questions & Answers

csplit limitations

I am trying to use the csplit file on a file that contains records that have more than 2048 characters on a line. The resultant split file seems to ignore the rest of the line and I lose the data. Is there any way that csplit can handle record lengths greater than 2048? Thanks (0 Replies)
Discussion started by: ravagga
0 Replies

3. UNIX for Dummies Questions & Answers

Password limitations.

I would like to set my minimum password length to on Linux and AIX. However, doing this normally would only make it so newly added users will be affected by this. I would like for when I make this change, it either truncates everyone elses password, or prompts them to change it to 8+ characters.... (2 Replies)
Discussion started by: syndex
2 Replies

4. Solaris

Solaris 9 or 10 LUN Limitations

Is there a limit to the number of LUNS that can be concatenated using Solaris Volume manager with Soft partitions? I have worked with some AIX admins in the past and there was such a limitation therefore limiting the size the filesystem could grow to. Is there such a limitation in Solaris 9... (6 Replies)
Discussion started by: BG_JrAdmin
6 Replies

5. UNIX and Linux Applications

gnuplot limitations

I'm running a simulation (programmed in C) which makes calls to gnuplot periodically to plot data I have stored. First I open a pipe to gnuplot and set it to multiplot: FILE * pipe = popen("gnuplot", "w"); fprintf(pipe, "set multiplot\n"); fflush(pipe); (this pipe stays open until the... (0 Replies)
Discussion started by: sedavidw
0 Replies

6. Red Hat

Limitations on the partition of linux

Hi, I need a documentation about limitations on the linux partition. On how many primary and extended I could create. And also on different type of storage, how many big capacity I can create. Thanks. (3 Replies)
Discussion started by: itik
3 Replies

7. Shell Programming and Scripting

perl limitations vs. bash?

I've building a bunch of bash scripts, and am thinking about "converting" to perl, and have a couple questions first: 1. Is there anything bash will do that perl won't? 2. How steep is the learning curve? 3. If perl's more powerful, why? 4. I've built a small app in python, which seemed nice,... (18 Replies)
Discussion started by: unclecameron
18 Replies

8. Shell Programming and Scripting

Limitations of tac/cat?

As part of a quiz assigned during my unix class I was asked to write a program to ask for a file name, print read errors, and "reverse elements in a list." I used the 'tac' command in my solution, however, I was then lectured for 5 min about the "limitations" of the 'tac' command and how a 'for'... (6 Replies)
Discussion started by: 127.0.0.1
6 Replies

9. Solaris

Solaris limitations

Hi, I recently started working with Solaris, and what I noticed is that a lot of commands I used to regularly use don't work, like sed -i and grep -r. I have found work arounds for these problems though but it's a pain in the ass. I'm just wondering why they decided not to include these handy... (4 Replies)
Discussion started by: Subbeh
4 Replies

10. UNIX for Beginners Questions & Answers

Limitations of 'pdftotext' in Linux...

Guys: I have a customer using the 'pdftotext' utility under Linux. PDFs are received via email, converted to text, etc. and it has worked nicely for years. They received a PDF from a customer and the utility will not read it. The text file is created but it's either empty or has 1-2 bytes of... (23 Replies)
Discussion started by: kenlenard
23 Replies
pcf(4)							     Kernel Interfaces Manual							    pcf(4)

NAME
pcf - port configuration file used by DDFA software Description A port configuration file is used by the Datacommunications and Terminal Controller Device File Access (DDFA) software to configure indi- vidual terminal server ports. The generic name of the template file is In practice, it is renamed for each port that needs different con- figuration values and the values are altered appropriately for the device attached to the port. A port configuration file is referenced by an entry in the Dedicated Ports file The Dedicated Port Parser parses the file and spawns an Outbound Connection Daemon for each valid entry in the file. A valid entry is one in which the fourth field is the name of a port configuration file. The master port configuration file is and it should only be referenced in the file if the default values it contains are correct for the ports. If different values are needed, should be copied to another directory and the copy should be modified and referenced in the file. The recommended procedure is to create a directory to hold the port configuration files and the modified file. See ddfa(7) for more information on how to configure the DDFA software. A port configuration file consists of the names of variables and their values. The variables are shown terminated by a colon but this is not mandatory. A variable and its value can be separated by spaces or tabs. Only one variable-value pair is allowed per line. Only the value should be altered. The variable name should not be changed. A file contains the following information: This can have the value or When it is enabled, data transfer over the network uses the Telnet protocol. This option be enabled for a DTC. This can have the value or When it is enabled, a telnet timing mark negotiation is sent to the terminal server after all user data has been transferred. waits for a reply to the timing mark negotiation before closing the connection. This ensures that all data has been output from the terminal server to the device before the buffers are flushed. It should be enabled for a DTC. This defines the time in seconds during which the software waits for a response to the telnet timing mark and binary negotiation. If the timer expires, an error message is logged to and the error is transmitted to the user application. This can have the value or When it is enabled, data transfer over the network is in binary mode and treatment of special characters (such as XON/XOFF) is disabled. Due to the absence of flow control, data integrity cannot be guaranteed when is enabled. Note that even if is disabled, it can be negotiated at any time by the application setting to in the data structure. This defines the number of times the software tries to open a connection before giving up. If the value is the software tries ``forever'' (approximately 68 years). If the retry process fails, an error message is logged to and the error is transmitted to the user application. The retry process can be interrupted by sending the signal to the process using Note that if the application exits after asking to open the connection to the terminal server, continues trying to open until the combination of the and are exceeded. This defines the time in seconds between open tries. If the value is uses an exponential retry period algorithm up to 32 seconds (i.e., 1 2 4 8 16 32 32 32 ...). This defines the time in seconds between the close call made by the application on the pty slave and the moment when the connection is actually closed. Setting this value to, for example, 5 seconds avoids the overhead of opening and closing the connection when a spooler spools several files at a time. Setting a sufficiently high value effectively leaves the connection permanently open. This can have the value or When it is enabled, the software sends a status request to the device attached to the terminal server and processes the reply as follows: continues processing. retries within the limits of the status timer. retries within the limits of the status timer. retries within the limits of the status timer. retries within the limits of the status timer. This defines the time in seconds during which the software waits for the reply to the status request. If the timer expires, an error message is logged to and the error is transmitted to the user application. This can have the value or Normally, data bytes processed by the pty have bit 7 stripped. If is enabled, the stripping is disabled. If is disabled, stripping is enabled and bit 7 is stripped. This can also be achieved by changing the termio structure of the pseudonym using ioctl() commands. This can have the value or When it is enabled, data is sent to the LAN as it is received. It can be disabled if the software is sending pack- ets faster than the server can accept them. The default values are: WARNINGS
In order to ensure that commands (such as ps) display the correct device file name (that is, the pseudonym), all pseudonyms should be placed into the directory If pseudonyms are not specified for placement in this directory, the correct display of device file names with many commands is not guaranteed. In addition, in order to ensure that commands (such as and work correctly, each pseudonym must be unique in its first 17 characters (including the directory prefix If pseudonyms are not unique in their first 17 characters, the correct functioning of many commands is not guaranteed. FILES
SEE ALSO
dpp(1M), ocd(1M), ocdebug(1M), dp(4), ddfa(7). pcf(4)
All times are GMT -4. The time now is 01:30 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy